Search
Now showing items 1-10 of 10
A Framework for secure mobile cloud computing in effective electronic learning
(International Journal of Innovative Research and Advanced Studies, 2018-01)
Abstract: In the last few years, most universities have adopted E-Learning as a new approach to teaching and learning. However, the explosive growth and usage of mobile applications and the emergence of mobile cloud computing ...
Data and voice signal intelligence interception over the GSM Um Interface
(International Journal of Research and Innovations in Science and Technology, 2016)
The Enhanced Data rates for GSM Evolution (EDGE) is a digital mobile phone technology that permits enhanced data communication rates as a backward-compatible annex of the Global System for Mobile communications (GSM). It ...
Security and acceptance of web based marketing information system among microfinance banks in Nairobi region, Kenya
(HR mars, 2012)
Information system (IS) acceptance has been the subject of much research in the past two decades. Researchers have concentrated their efforts on identifying the conditions or factors that could facilitate the acceptance ...
Empirical investigation of instant messaging security in a virtual environment
(International Journal of Computer Applications Technology and Research, 2016)
Use of instant messaging services is becoming increasingly popular with Internet based systems like America Online’s Instant Messaging (AIM), Microsoft’s MSN Messenger, Yahoo! Messenger, WhatsApp, Viber, Kakaotalk, Skype ...
Integrated financial management information system and its effect on cash management in Eldoret west district treasury, Kenya
(Center for Promoting Ideas, USA, 2014)
The purpose of this study was to investigate the effect of IFMIS on cash management practices in the public service. This has been necessitated by the fact that the use of IFMIS in the public service is undergoing challenges ...
Secure Handover Protocol for High Speed 5GNetworks
(Int.J. AdvancedNetworkingandApplications, 2020-07-07)
The motivations behind 5G networks include seamless handovers, higher data rates, lower latencies of about one milli second, and enhanced coverage compared to 4G networks. To achieve these goals, network densification has ...
A Stratified Cyber Security Vigilance Model: An Augmentation of Risk -Based Information System Security
(Transactions on Networks and Communications, 2018-09-14)
Information system security in the current interconnected environment called the cyber-space is continually getting more sophisticated. All the players involved- governments, corporates, IS security experts and users, both ...
Efficient Group Authentication Protocol for Secure 5G Enabled Vehicular Communications
(IEEE, 2020-12-30)
The fifth generation (5G) networks exhibit extremely low latency, extremely high bandwidth, and high density connections that are salient features for the support of vehicle to everything (V2X) services. Although a lot of ...
Enhanced Information Systems Success Model for Patient Information Assurance
(Journal of Computer Science Research, 2021-10-13)
The current health information systems have many challenges such as lack of standard user interfaces, data security and privacy issues, inability to uniquely identify patients across multiple hospital information systems, ...
Machine Learning Protocol for Secure 5G Handovers
(JOOUST, 2022-01-27)
The fifth generation (5G) networks are characterized with ultra-dense deployment of base stations with limited footprint. Consequently, user equipment’s handover frequently as they move within 5G networks. In addition, 5G ...